Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2022 20:00

General

  • Target

    57cb79ff37edcbacd2f4d7aabe5835099a75ee078107b0b00efdb41906d3a1b6.exe

  • Size

    305KB

  • MD5

    843485dbff12620fb58532fab189a3fe

  • SHA1

    fb6287c7bd9cfd01481430c14f4e9c2ed4d1fd65

  • SHA256

    57cb79ff37edcbacd2f4d7aabe5835099a75ee078107b0b00efdb41906d3a1b6

  • SHA512

    a582cd5c679d65e5997a2e1f899ece3a5f6834ba4d4c24ca36cb877e3275cff86d8b7aeb223014e845ee326a5e491425f1519fa67e6fa4fba5344d14605c7f00

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

hx227

Decoy

lapizapps.com

heitoping.com

pthelperspositivev.win

gmxpic.com

valuecodeliving.com

kredit-hilfe-gesucht.com

totalwebservices.online

impressionscarpetcleaning.net

cqpsds.info

1q2fiveafter.men

campbellpropertiesuk.com

avalon.loans

bankcardssite.market

connqa.com

luludallas.com

acessoitaucard.net

ad-concier.com

blrsi.com

zecrypto.com

com-services-secure-id.info

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook payload 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\57cb79ff37edcbacd2f4d7aabe5835099a75ee078107b0b00efdb41906d3a1b6.exe
      "C:\Users\Admin\AppData\Local\Temp\57cb79ff37edcbacd2f4d7aabe5835099a75ee078107b0b00efdb41906d3a1b6.exe"
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:788
      • C:\Windows\SysWOW64\cmd.exe
        "cmd"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:484
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:616
          • C:\Windows\SysWOW64\cmd.exe
            "cmd"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2044
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ncvmxzoureascvnz" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\ncvmxzoureascvnz.txt" | cmd"
              6⤵
              • Adds Run key to start application
              PID:2040
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe"
            5⤵
            • Executes dropped EXE
            PID:1120
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:2016
    • C:\Windows\SysWOW64\wininit.exe
      "C:\Windows\SysWOW64\wininit.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe"
        3⤵
          PID:632

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe
      Filesize

      305KB

      MD5

      843485dbff12620fb58532fab189a3fe

      SHA1

      fb6287c7bd9cfd01481430c14f4e9c2ed4d1fd65

      SHA256

      57cb79ff37edcbacd2f4d7aabe5835099a75ee078107b0b00efdb41906d3a1b6

      SHA512

      a582cd5c679d65e5997a2e1f899ece3a5f6834ba4d4c24ca36cb877e3275cff86d8b7aeb223014e845ee326a5e491425f1519fa67e6fa4fba5344d14605c7f00

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe
      Filesize

      305KB

      MD5

      843485dbff12620fb58532fab189a3fe

      SHA1

      fb6287c7bd9cfd01481430c14f4e9c2ed4d1fd65

      SHA256

      57cb79ff37edcbacd2f4d7aabe5835099a75ee078107b0b00efdb41906d3a1b6

      SHA512

      a582cd5c679d65e5997a2e1f899ece3a5f6834ba4d4c24ca36cb877e3275cff86d8b7aeb223014e845ee326a5e491425f1519fa67e6fa4fba5344d14605c7f00

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe
      Filesize

      305KB

      MD5

      843485dbff12620fb58532fab189a3fe

      SHA1

      fb6287c7bd9cfd01481430c14f4e9c2ed4d1fd65

      SHA256

      57cb79ff37edcbacd2f4d7aabe5835099a75ee078107b0b00efdb41906d3a1b6

      SHA512

      a582cd5c679d65e5997a2e1f899ece3a5f6834ba4d4c24ca36cb877e3275cff86d8b7aeb223014e845ee326a5e491425f1519fa67e6fa4fba5344d14605c7f00

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe
      Filesize

      305KB

      MD5

      843485dbff12620fb58532fab189a3fe

      SHA1

      fb6287c7bd9cfd01481430c14f4e9c2ed4d1fd65

      SHA256

      57cb79ff37edcbacd2f4d7aabe5835099a75ee078107b0b00efdb41906d3a1b6

      SHA512

      a582cd5c679d65e5997a2e1f899ece3a5f6834ba4d4c24ca36cb877e3275cff86d8b7aeb223014e845ee326a5e491425f1519fa67e6fa4fba5344d14605c7f00

    • C:\Users\Admin\AppData\Roaming\N9-QS0A1\N9-logim.jpeg
      Filesize

      64KB

      MD5

      cf4aabcaa83bc15453e388ff990c1f4c

      SHA1

      c70fc9db61849a7145e389c544df8c26daee7ed8

      SHA256

      0fcee152685649447e039e546dcf44e237d980c8374a1565691c6e32d207881f

      SHA512

      c5aa103e92084f1aeb3cd594a54021562af4959c8a48e738c3cdfef059939f595a9231afa567386c2d4660e7329d808ae6a7fe53780caeedf3ee57cec5b5df58

    • C:\Users\Admin\AppData\Roaming\N9-QS0A1\N9-logri.ini
      Filesize

      40B

      MD5

      d63a82e5d81e02e399090af26db0b9cb

      SHA1

      91d0014c8f54743bba141fd60c9d963f869d76c9

      SHA256

      eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

      SHA512

      38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

    • C:\Users\Admin\AppData\Roaming\N9-QS0A1\N9-logrv.ini
      Filesize

      40B

      MD5

      ba3b6bc807d4f76794c4b81b09bb9ba5

      SHA1

      24cb89501f0212ff3095ecc0aba97dd563718fb1

      SHA256

      6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

      SHA512

      ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe
      Filesize

      305KB

      MD5

      843485dbff12620fb58532fab189a3fe

      SHA1

      fb6287c7bd9cfd01481430c14f4e9c2ed4d1fd65

      SHA256

      57cb79ff37edcbacd2f4d7aabe5835099a75ee078107b0b00efdb41906d3a1b6

      SHA512

      a582cd5c679d65e5997a2e1f899ece3a5f6834ba4d4c24ca36cb877e3275cff86d8b7aeb223014e845ee326a5e491425f1519fa67e6fa4fba5344d14605c7f00

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncvmxzo.exe
      Filesize

      305KB

      MD5

      843485dbff12620fb58532fab189a3fe

      SHA1

      fb6287c7bd9cfd01481430c14f4e9c2ed4d1fd65

      SHA256

      57cb79ff37edcbacd2f4d7aabe5835099a75ee078107b0b00efdb41906d3a1b6

      SHA512

      a582cd5c679d65e5997a2e1f899ece3a5f6834ba4d4c24ca36cb877e3275cff86d8b7aeb223014e845ee326a5e491425f1519fa67e6fa4fba5344d14605c7f00

    • memory/484-56-0x0000000000000000-mapping.dmp
    • memory/560-86-0x0000000001F40000-0x0000000002243000-memory.dmp
      Filesize

      3.0MB

    • memory/560-82-0x0000000000000000-mapping.dmp
    • memory/560-85-0x0000000000800000-0x000000000081A000-memory.dmp
      Filesize

      104KB

    • memory/560-87-0x00000000000D0000-0x00000000000FA000-memory.dmp
      Filesize

      168KB

    • memory/560-91-0x00000000000D0000-0x00000000000FA000-memory.dmp
      Filesize

      168KB

    • memory/560-89-0x0000000000760000-0x00000000007F3000-memory.dmp
      Filesize

      588KB

    • memory/616-60-0x0000000000000000-mapping.dmp
    • memory/616-72-0x0000000074B40000-0x00000000750EB000-memory.dmp
      Filesize

      5.7MB

    • memory/616-88-0x0000000074B40000-0x00000000750EB000-memory.dmp
      Filesize

      5.7MB

    • memory/632-84-0x0000000000000000-mapping.dmp
    • memory/788-54-0x0000000076601000-0x0000000076603000-memory.dmp
      Filesize

      8KB

    • memory/788-63-0x0000000074B40000-0x00000000750EB000-memory.dmp
      Filesize

      5.7MB

    • memory/788-55-0x0000000074B40000-0x00000000750EB000-memory.dmp
      Filesize

      5.7MB

    • memory/1264-90-0x0000000006AB0000-0x0000000006B87000-memory.dmp
      Filesize

      860KB

    • memory/1264-78-0x0000000004280000-0x000000000435E000-memory.dmp
      Filesize

      888KB

    • memory/1264-92-0x0000000006AB0000-0x0000000006B87000-memory.dmp
      Filesize

      860KB

    • memory/1264-81-0x0000000006940000-0x0000000006AA2000-memory.dmp
      Filesize

      1.4MB

    • memory/2016-75-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2016-83-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2016-80-0x00000000003D0000-0x00000000003E4000-memory.dmp
      Filesize

      80KB

    • memory/2016-77-0x0000000000290000-0x00000000002A4000-memory.dmp
      Filesize

      80KB

    • memory/2016-76-0x0000000000770000-0x0000000000A73000-memory.dmp
      Filesize

      3.0MB

    • memory/2016-71-0x000000000041B620-mapping.dmp
    • memory/2016-70-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2016-68-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2016-67-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2040-65-0x0000000000000000-mapping.dmp
    • memory/2044-64-0x0000000000000000-mapping.dmp